Back to Home
zinja-coder icon

jadx-mcp-server

Verified Safe

by zinja-coder

Overview

Facilitates live, LLM-driven reverse engineering and vulnerability analysis of Android APKs by integrating JADX with the Model Context Protocol.

Installation

Run Command
python jadx_mcp_server.py --http --port 8651 --jadx-port 8650

Security Notes

The Python server primarily acts as a proxy, forwarding requests to a local JADX-AI-MCP plugin (Java). Communication is restricted to localhost (127.0.0.1), reducing network attack surface for the server itself. No 'eval' or direct code injection vulnerabilities are apparent in the Python codebase. However, the powerful refactoring tools (e.g., renaming classes, methods, fields, packages) expose significant capabilities of the underlying JADX plugin. The overall security and integrity of the analysis and modifications depend heavily on the robustness of the JADX-AI-MCP plugin and how LLMs utilize these tools. Users must ensure authorized usage as per the project's disclaimer.

Similar Servers

Stats

Interest Score68
Security Score8
Cost ClassMedium
Avg Tokens2500
Stars270
Forks43
Last Update2026-01-08

Tags

Android Reverse EngineeringLLM IntegrationAPK AnalysisStatic AnalysisDynamic Analysis